Practice Free FC0-U71 Exam Online Questions
Which of the following programming languages can be used to package a program?
- A . Query
- B . Assembly
- C . Scripting
- D . Compiled
A database administrator wants to retrieve recently updated entries.
Which of the following functions should the administrator run to complete the task?
- A . Create
- B . Query
- C . Import
- D . Report
B
Explanation:
To extract specific information from a database, especially recently updated entries, a query is used.
Queries filter and retrieve data based on conditions like dates, fields, or status.
“A query is a request for data or information from a database table or combination of tables.” ― CompTIA ITF+ Data Management
Correct answer: B
Given the following pseudocode:
10 READ Q,W
20 PRINT Q,W
30 GOTO 10
40 DATA 10,20,30,40,50,60,70,80,90,100
Which of the following best defines the type of data being used?
- A . Boolean
- B . Array
- C . Variable
- D . Function
B
Explanation:
The pseudocode reads from a block of numbers listed in line 40. This collection of values is structured like an array―a group of data elements stored together.
“An array is a collection of similar data elements stored in a structured sequence, often referenced or processed in loops.” ― CompTIA ITF+ Programming Concepts
Correct answer: B
A user wants to download music from a computer to a smartphone.
Which of the following cables should the user use to transfer the files?
- A . USB-C
- B . VGA
- C . Thunderbolt
- D . NFC
A
Explanation:
USB-C is commonly used for both charging and data transfer between modern computers and smartphones. It supports high-speed data transmission and is a standard port on most new smartphones.
“USB-C cables support power delivery and high-speed data transfer, and are commonly used to connect smartphones to computers.” ― CompTIA ITF+ Guide
VGA is for video output.
Thunderbolt is high-speed, but typically used with Apple or specialized hardware.
NFC is a wireless protocol, not a cable.
Correct answer: A
Which of the following wireless technologies would most likely be used to make a purchase from a vending machine?
- A . 802.11X
- B . SFP
- C . Bluetooth
- D . NFC
Given the following data sequence:
1, 10, 2, 3, 4, 5, 6, 7, 8, 9
Which of the following data types are these values an example of?
- A . Float
- B . ASCII
- C . Boolean
- D . String
D
Explanation:
Although the values look numeric, the sequence “1, 10, 2…” suggests they are being treated as strings (text values), especially if they are not sorted numerically. In programming, strings are sequences of characters―even if those characters are digits.
“String data type is used to store alphanumeric characters, including numeric characters represented as text rather than numbers.” ― CompTIA ITF+ Data Concepts
Correct answer: D
A user needs to stop an application that is running on a laptop.
Which of the following best describes the part of the OS that is needed to perform this operation?
- A . Task scheduling
- B . Disk management
- C . Access control
- D . Process management
Which of the following is most commonly used to connect devices to a switch?
- A . NFC
- B . RJ45
- C . USB-A
- D . DVI
A user is typing a document using a keyboard.
Which of the following describes this action?
- A . Input
- B . Storage
- C . Output
- D . Processing
A
Explanation:
A keyboard allows a user to enter data into a system:
“Input devices allow users to provide data or control signals to the computer; keyboards are primary examples.”
Storage saves data, output displays data, and processing handles data operations.
Reference: CompTIA ITF+ FC0-U71 Official Study Guide, Chapter 5 C Input and Output Devices.
A user is logged in but unable to access a shared folder on the network.
Which of the following security concepts is in place?
- A . Authentication
- B . Authorization
- C . Accounting
- D . Non-repudiation
B
Explanation:
This scenario describes a situation where a user has already successfully logged into the system (i.e., has been authenticated) but cannot access a particular network resource (the shared folder). This falls under the concept of authorization, which determines what actions or resources a user is permitted to access after authentication.
“Authorization is the process of granting or denying access to network resources once the user has been authenticated.” ― CompTIA ITF+ Official Study Guide
Authentication verifies the identity of the user (e.g., username and password).
Authorization controls access rights (e.g., shared folders, files).
Accounting tracks user activity (e.g., audit logs).
Non-repudiation ensures actions or transactions cannot be denied later.
Therefore, the correct answer is B: Authorization.
